Volume 15 , Issue 1 , PP: 332-341, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Sunil Kr Pandey 1 , Prashant Kumar Shukla 2 , Piyush Kumar Pareek 3 * , Cosmena Mahapatra 4 , Puneet Kumar Aggarwal 5 , Udit Mamodiya 6
Doi: https://doi.org/10.54216/JCIM.150126
This research examines all internet security protocols. To develop and test a novel network protection method. The research's comprehensive methodology includes a detailed review of existing security measures, a critical investigation of the recommended method's components, and a vital analysis of its effectiveness. AES is critical to the recommended code efficiency technique. The ablation investigation highlights AES's importance for fast encryption. Multi-factor authentication (MFA) protects and boosts authentication scores, making login simpler. The article defines "fast intrusion reaction time" and provides examples of how quickly the proposed technique may handle security incidents. The ablation research highlights the impact on this swift response, underscoring the importance of proactive intrusion detection and response. The study's findings will help firms secure their websites. The recommended solution is superior to others and protects against emerging internet dangers. The report recommends quick response systems, multi-layered identities, and security upgrades. This research teaches us online safety principles. It also provides a standard for network protection firms. Many studies have proved that the recommended strategy works, making it a significant aspect of current defensive efforts to address global concerns.
Advanced Encryption Standard , Authentication , Cybersecurity , Internet Security , Intrusion Detection , Multi-Factor Authentication , Network Safety , Security Methodology , Threat Landscape , User Authentication
[1] B. Ji, X. Zhang, S. Mumtaz, et al., "Survey on the internet of IEEE Communications Standards Magazine, vol. 4, no. 1, pp. 34–41, 2020, "Vehicles: Network Architectures and Applications."
[2] J. Raiyn, "Data and Cyber Security in Autonomous Vehicle Networks," Transport and Telecommunication Journal, vol. 19, no. 4, pp. 325–334, 2018.
[3] T. Maitra et al., "A Robust Elgamal-Based Password-Authentication Protocol Using Smart Card for Client-Server Communication," International Journal of Communication Systems, vol. 30, no. 11, p. e3242, 2017.
[4] V. Roy. “An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things" Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023 ,PP. 8-17.
[5] N. Sharma, N. Chauhan, and N. Chand, "Security Challenges in Internet of Vehicles (IOV) Environment," in Proceedings of the 2018 First International Conference on Secure Cyber Computing and Communication, pp. 203–207, IEEE, Jalandhar, India, December 2018.
[6] Sujeetha Devi, Bhagyalakshmi L and Sanjay Kumar Suman, “Enhancing the Performance of Wireless Sensor Networks through Clustering and Joint Routing with Mobile Sink”, International Journal of Engineering and Advanced Technology, vol. 8, issue 6, pp. 323-327, 2019
[7] L. Bhagyalakshmi, Sanjay Kumar Suman, S. Mohanalakshmi, and Satyanand Singh, “Improving Spectral Efficiency and Coverage Capacity of 5G Networks: A Review”, Advances in mathematics: scientific journal, vol.9, no. 6, pp. 3387-3397, 2020.
[8] Lamia Mohamed Ahmed , Gawaher Soliman Hussein , Abdel Nasser Hessin Zaied, A Survey on Sentiment Analysis Algorithms and Techniques For Arabic Textual Data, Fusion: Practice and Applications, Vol. 2 , No. 2 , (2020) : 74-87 (Doi : https://doi.org/10.54216/FPA.020205)
[9] Samia Mandour , Ibrahim el-henawy , Kareem Ahmed, An Improved Equilibrium Optimizer Algorithm for Tackling Global Optimization Problems, Fusion: Practice and Applications, Vol. 3 , No. 1 , (2021) : 01-28 (Doi : https://doi.org/10.54216/FPA.030101)
[10] S. A. Chaudhry, "Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles," Security and Communication Networks, vol. 2021, Article ID 5554318, 9 pages, 2021.
[11] S. A. Chaudhry, "Combating Identity De-synchronization: An Improved Lightweight Symmetric Key Based Authentication Scheme for IOV," Journal of Network Intelligence, vol. 6, no. 12, 2021.
[12] N. Liu, "Internet of Vehicles: Your Next Connection," Huawei WinWin, vol. 11, pp. 23–28, 2011.
[13] F. Bonomi and C. Fellow, "The Smart and Connected Vehicle and the Internet of Things," Invited Talk, Workshop on Synchronization in Telecommunication Systems, 2013.
[14] Muhammad Edmerdash, Waleed khedr, Ehab Rushdy, An Overview of Cloud-Based Secure Services for Enterprise Drug–Drug Interaction Systems, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 2 , (2021) : 49-58 (Doi : https://doi.org/10.54216/IJWAC.020201)
[15] Noushini Nikeetha P. , Pavithra D. , Sivakarthiga K. , Karthika S. , Yashitha R. , Kirubasri G.V., A Survey on IoT based Wearable Sensor for Covid-19 Pandemic, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 2 , (2021) : 77-87 (Doi : https://doi.org/10.54216/IJWAC.020203)
[16] F. D. Da Cunha et al., "Data Communication in VANETs: A Survey, Challenges and Applications," INRIA Saclay; INRIA, Rocquencourt, France, 2014, Ph.D. Dissertation.
[17] H. Sodhro et al., "AI-Enabled Reliable Channel Modeling Architecture for Fog Computing Vehicular Networks," IEEE Wireless Communications, vol. 27, no. 2, pp. 14–21, 2020.
[18] F. Yang et al., "An Overview of Internet of Vehicles," China Communications, vol. 11, no. 10, pp. 1–15, 2014.
[19] S. Yu et al., "IOV-SMAP: Secure and Efficient Message Authentication Protocol for IOV in Smart City Environment," IEEE Access, vol. 8, pp. 167875–167886, 2020.
[20] Subhalaxmi Sahoo , Sudan Jha , Deepak Prashar, A novel approach for Spam Email Filtering Using Machine Learning, Journal of Cybersecurity and Information Management, Vol. 2 , No. 2 , (2020) : 44-57 (Doi : https://doi.org/10.54216/JCIM.020202)
[21] Ahmed N. Al Masri , Hamam Mokayed, An Efficient Machine Learning based Cervical Cancer Detection and Classification, Journal of Cybersecurity and Information Management, Vol. 2 , No. 2 , (2020) : 58-67 (Doi : https://doi.org/10.54216/JCIM.020203)
[22] S. Kuutti et al., "A Survey of the State-of-the-Art Localization Techniques and Their Potentials for Autonomous Vehicle Applications," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 829–846, 2018.
[23] V. Roy. "An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 ,PP. 42-52.
[24] R. Hussain and S. Zeadally, "Autonomous Cars: Research Results, Issues, and Future Challenges," IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1275–1313, 2019.
[25] Gajender Kumar, Vinod Patidar, Prolay Biswas, Mukta Patel, Chaur Singh Rajput, Anita Venugopal, Aditi Sharma, IOT enabled Intelligent featured imaging Bone Fractured Detection System, Journal of Intelligent Systems and Internet of Things, Vol. 9 , No. 2 , (2023) : 08-22 (Doi : https://doi.org/10.54216/JISIoT.090201)
[26] Alber S. Aziz, Moahmed Emad, Mahmoud Ismail, Heba Rashad, Ahmed M. Ali, Ahmed Abdelhafeez, Shimaa S. Mohamed, An Intelligent Multi-Criteria Decision-Making Model for selecting an optimal location for a data center: Case Study in Egypt, Journal of Intelligent Systems and Internet of Things, Vol. 9 , No. 2 , (2023) : 23-35 (Doi : https://doi.org/10.54216/JISIoT.090202)
[27] T. Jiang, H. Fang, and H. Wang, "Blockchain-Based Internet of Vehicles: Distributed Network Architecture and Performance Analysis," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4640–4649, 2019.